• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 391
Next 10 →

LockX: A System for Efficiently Querying Secure XML

by Sungran Cho Stevens, Laks V. S. Lakshmanan, Divesh Srivastava , 2003
"... ommercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SIGMOD 2003, June 9-12, 2003, San Diego, CA Copyright 2003 ACM 1-58113-634 ..."
Abstract - Add to MetaCart
-58113-634-X/03/06 ...$5.00. We describe LockX, a system for specifying and efficiently querying secure XML documents. LockX is based on a simple, yet useful, security model that uses a multi-level access control specification. The DTD identifies which elements must, may, or cannot specify their security

Declarative Routing: Extensible Routing with Declarative Queries

by Boon Thau Loo, Joseph M. Hellerstein, Ion Stoica, Raghu Ramakrishnan , 2005
"... The Internet's core routing infrastructure, while arguably robust and efficient, has proven to be difficult to evolve to accommodate the needs of new applications. Prior research on this problem has included new hard-coded routing protocols on the one hand, and fully extensible Active Networks ..."
Abstract - Cited by 133 (45 self) - Add to MetaCart
query language. We show that our query language is a natural fit for routing, and can express a variety of well-known routing protocols in a compact and clean fashion. We discuss the security of our proposal in terms of its computational expressive power and language design. Via simulation

CryptDB: Protecting confidentiality with encrypted query processing

by Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan - In SOSP , 2011
"... Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access to private data, and because curious or malicious administrators may capture and leak data. CryptDB is a system that provides practical and provable confidentiality in th ..."
Abstract - Cited by 124 (8 self) - Add to MetaCart
in the face of these attacks for applications backed by SQL databases. It works by executing SQL queries over encrypted data using a collection of efficient SQL-aware encryption schemes. CryptDB can also chain encryption keys to user passwords, so that a data item can be decrypted only by using the password

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
you quite quickly what to choose. However, you cannot use the same simple emotional judgment when you are in the shoes of an economist trying to optimize the access to the locks on the Mississippi River. The task is to find a pricing structure that assures the most efficient and uninterrupted use

Practical identity-based encryption without random oracles

by Craig Gentry - of LNCS
"... Abstract. We present an Identity Based Encryption (IBE) system that is fully secure in the standard model and has several advantages over previous such systems – namely, computational efficiency, shorter public parameters, and a “tight ” security reduction, albeit to a stronger assumption that depen ..."
Abstract - Cited by 140 (2 self) - Add to MetaCart
Abstract. We present an Identity Based Encryption (IBE) system that is fully secure in the standard model and has several advantages over previous such systems – namely, computational efficiency, shorter public parameters, and a “tight ” security reduction, albeit to a stronger assumption

Translating XSLT Programs to Efficient SQL Queries

by Sushant Jain, Ratul Mahajan, Dan Suciu - In WWW , 2002
"... We present an algorithm for translating XSLT programs into SQL. Our context is that of virtual XML publishing, in which a single XML view is defined from a relational database, and subsequently queried with XSLT programs. Each XSLT program is translated into a single SQL query and run entirely in th ..."
Abstract - Cited by 28 (0 self) - Add to MetaCart
to achieve this efficiency. We have tested our system on all 22 SQL queries of the TPC-H database benchmark which we represented in XSLT and then translated back to SQL using our translator.

Efficient Querying and Maintenance of Network Provenance at Internet-Scale

by Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, Boon Thau Loo , Yun Mao , 2010
"... Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Such capabilities often utilize network provenance – the ability to issue queries over network meta-data. For example, network provenance may be used to trace the ..."
Abstract - Cited by 48 (26 self) - Add to MetaCart
provenance efficiently. The ExSPAN prototype is developed using Rapid-Net, a declarative networking platform based on the emerging ns-3 toolkit. Experiments over a simulated network and an actual deployment in a testbed environment demonstrate that our system supports a wide range of distributed provenance

L.V.S.: Efficient secure query evaluation over encrypted XML databases

by Hui (wendy Wang - In: Proc. of the 32nd International Conference on Very Large Data Bases (VLDB’06), Seoul, Korea , 2006
"... Motivated by the ”database-as-service ” paradigm wherein data owned by a client is hosted on a third-party server, there is significant interest in secure query evaluation over encrypted databases. We consider this problem for XML databases. We consider an attack model where the attacker may possess ..."
Abstract - Cited by 50 (2 self) - Add to MetaCart
Motivated by the ”database-as-service ” paradigm wherein data owned by a client is hosted on a third-party server, there is significant interest in secure query evaluation over encrypted databases. We consider this problem for XML databases. We consider an attack model where the attacker may

Security Issues in Querying Encrypted Data

by Purdue E-pubs, Murat Kantarioglu, Chris Clifton, Murat Kantarciogulu, Christopher Clifton, Murat Kantarcloglu, Chris Clifton , 2004
"... There has been considerable interest in querying encrypted data, allowing a "secure database server " model where the server does not know data values. This paper shows how results from cryptography prove the impossibility of developing a server that meets cryptographic-style definitions o ..."
Abstract - Add to MetaCart
, and sketch how a practi-cal system meeting the definition could be built and proven secure. The primary goal of this paper is to provide a vision of how research in this area should proceed: efficient encrypted database and query processing with provable security properties. 1

Query Evaluation with Constant Delay

by Thèse De Doctorat, Normale Supérieure, De Cachan, Présentée Par, Monsieur Wojciech Kazana, Docteur De, Supérieure De Cachan, Nicole Bidoit, Professeur Président, Arnaud Durand, Patrice Ossona, Mendez Chargé, Victor Vianu, Professeur Examinateur, Luc Segoufin, Directeur Recherche Directeur
"... I am grateful to Luc Segoufin who kindly accepted me to be his PhD student. He introduced me to the problem of query enumeration and encouraged me to look for the answers to all the questions that emerged during our collaboration. He was a truly great advisor, always supportive and available for dis ..."
Abstract - Add to MetaCart
I am grateful to Luc Segoufin who kindly accepted me to be his PhD student. He introduced me to the problem of query enumeration and encouraged me to look for the answers to all the questions that emerged during our collaboration. He was a truly great advisor, always supportive and available
Next 10 →
Results 1 - 10 of 391
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University